{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2016-01-25T00:00:00.000Z","descriptions":[{"lang":"en","value":"actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-09-09T09:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"openSUSE-SU-2016:0372","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"},{"name":"openSUSE-SU-2016:0363","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"},{"name":"FEDORA-2016-94e71ee673","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"},{"name":"[ruby-security-ann] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack","tags":["mailing-list","x_refsource_MLIST"],"url":"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ"},{"name":"FEDORA-2016-f486068393","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"},{"name":"SUSE-SU-2016:1146","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"},{"name":"81800","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/81800"},{"name":"1034816","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1034816"},{"name":"[oss-security] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2016/01/25/9"},{"name":"DSA-3464","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2016/dsa-3464"},{"name":"RHSA-2016:0296","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2016-0296.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2016-0751","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"openSUSE-SU-2016:0372","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"},{"name":"openSUSE-SU-2016:0363","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"},{"name":"FEDORA-2016-94e71ee673","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"},{"name":"[ruby-security-ann] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack","refsource":"MLIST","url":"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ"},{"name":"FEDORA-2016-f486068393","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"},{"name":"SUSE-SU-2016:1146","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"},{"name":"81800","refsource":"BID","url":"http://www.securityfocus.com/bid/81800"},{"name":"1034816","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1034816"},{"name":"[oss-security] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2016/01/25/9"},{"name":"DSA-3464","refsource":"DEBIAN","url":"http://www.debian.org/security/2016/dsa-3464"},{"name":"RHSA-2016:0296","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-0296.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T22:30:03.975Z"},"title":"CVE Program Container","references":[{"name":"openSUSE-SU-2016:0372","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html"},{"name":"openSUSE-SU-2016:0363","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html"},{"name":"FEDORA-2016-94e71ee673","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html"},{"name":"[ruby-security-ann] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ"},{"name":"FEDORA-2016-f486068393","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html"},{"name":"SUSE-SU-2016:1146","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html"},{"name":"81800","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/81800"},{"name":"1034816","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1034816"},{"name":"[oss-security] 20160125 [CVE-2016-0751] Possible Object Leak and Denial of Service attack in Action Pack","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2016/01/25/9"},{"name":"DSA-3464","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2016/dsa-3464"},{"name":"RHSA-2016:0296","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-0296.html"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2016-0751","datePublished":"2016-02-16T02:00:00.000Z","dateReserved":"2015-12-16T00:00:00.000Z","dateUpdated":"2024-08-05T22:30:03.975Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}